Analysis

  • max time kernel
    152s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    24-11-2022 00:21

General

  • Target

    74fcc04493fb7ad4df3e967265b0bd4fcaa10a8f2f8f3b9dce106487003f7d76.exe

  • Size

    120KB

  • MD5

    006d3038c135e04efc24749d1f9e4e0f

  • SHA1

    955b12400cf6dfbe15b07f058aaecdabfea0509e

  • SHA256

    74fcc04493fb7ad4df3e967265b0bd4fcaa10a8f2f8f3b9dce106487003f7d76

  • SHA512

    e4499be96ecee0422fc76caee9ab62cf610b0b3f9c0df26e8785a02d457925ba1106d5550dadd48629bc134ec5cb07fa3d279f96ffd0748ae1e8656a27b2bc89

  • SSDEEP

    3072:xGyqafpd1/l0izZF6yCenK2iGlefx8X1y:xGw1pzZF44K3AAKX1

Score
10/10

Malware Config

Signatures

  • Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 54 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\74fcc04493fb7ad4df3e967265b0bd4fcaa10a8f2f8f3b9dce106487003f7d76.exe
    "C:\Users\Admin\AppData\Local\Temp\74fcc04493fb7ad4df3e967265b0bd4fcaa10a8f2f8f3b9dce106487003f7d76.exe"
    1⤵
    • Modifies visiblity of hidden/system files in Explorer
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Users\Admin\noise.exe
      "C:\Users\Admin\noise.exe"
      2⤵
      • Modifies visiblity of hidden/system files in Explorer
      • Executes dropped EXE
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:1712

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Hidden Files and Directories

1
T1158

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Hidden Files and Directories

1
T1158

Modify Registry

2
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\noise.exe
    Filesize

    120KB

    MD5

    a1cecb0570bce629aa9567e771f44681

    SHA1

    7b082750ad1473591bfc12bf1c8a46bb441a8871

    SHA256

    7ebfc3d94ffb4845f71b2ac3b477c1cbc1c13fde1b5cb9e453c9f48b85296a89

    SHA512

    d11bccb363d5989c398ca63b66cc191936968cbefb36230ca80a7cf4b380eee8cb4f5e6cc184b12d1175f1a27b6501d8ab5d185f10f45bc51d5f8ab6883c69b4

  • C:\Users\Admin\noise.exe
    Filesize

    120KB

    MD5

    a1cecb0570bce629aa9567e771f44681

    SHA1

    7b082750ad1473591bfc12bf1c8a46bb441a8871

    SHA256

    7ebfc3d94ffb4845f71b2ac3b477c1cbc1c13fde1b5cb9e453c9f48b85296a89

    SHA512

    d11bccb363d5989c398ca63b66cc191936968cbefb36230ca80a7cf4b380eee8cb4f5e6cc184b12d1175f1a27b6501d8ab5d185f10f45bc51d5f8ab6883c69b4

  • \Users\Admin\noise.exe
    Filesize

    120KB

    MD5

    a1cecb0570bce629aa9567e771f44681

    SHA1

    7b082750ad1473591bfc12bf1c8a46bb441a8871

    SHA256

    7ebfc3d94ffb4845f71b2ac3b477c1cbc1c13fde1b5cb9e453c9f48b85296a89

    SHA512

    d11bccb363d5989c398ca63b66cc191936968cbefb36230ca80a7cf4b380eee8cb4f5e6cc184b12d1175f1a27b6501d8ab5d185f10f45bc51d5f8ab6883c69b4

  • \Users\Admin\noise.exe
    Filesize

    120KB

    MD5

    a1cecb0570bce629aa9567e771f44681

    SHA1

    7b082750ad1473591bfc12bf1c8a46bb441a8871

    SHA256

    7ebfc3d94ffb4845f71b2ac3b477c1cbc1c13fde1b5cb9e453c9f48b85296a89

    SHA512

    d11bccb363d5989c398ca63b66cc191936968cbefb36230ca80a7cf4b380eee8cb4f5e6cc184b12d1175f1a27b6501d8ab5d185f10f45bc51d5f8ab6883c69b4

  • memory/1160-56-0x0000000075A91000-0x0000000075A93000-memory.dmp
    Filesize

    8KB

  • memory/1712-59-0x0000000000000000-mapping.dmp